Mimecast Blog

By the Numbers – Breaking Down the HHS Breach Database
Although the calendar has turned f… Read More >

By the Numbers – Breaking Down the HHS Breach Database
Although the calendar has turned from 2017 to 2018, the headlines for data breaches as the result of email attacks aren’t all that different from last year. In early January we learned of a significant breach at Florida Medicaid that started wi… Read More >

NDB kicks off next week and more than half of organizations say they’re not ready.
With j… Read More >

NDB kicks off next week and more than half of organizations say they’re not ready.
With just days to go until Australia’s Notifiable Data Breaches (NDB) scheme takes effect, new research suggests that nearly half of Australian companies haven’t yet implemented the corporate cybersecurity controls a… Read More >

Catch up on the past week’s cybersecurity news
GDPR continues to dominate headlines this … Read More >

Catch up on the past week’s cybersecurity news
GDPR continues to dominate headlines this week as data protection officers brace for the upcoming regulations, the UK braces for what might be an imminent high-impact cyber-attack, and the 2018 Winter Olympics gets hacked during the opening ceremony.&n… Read More >

Older Posts

Get started on your road to a cyber resilience strategy with Threat Protection and Adaptability.
I’ll be the first to admit it - there’s a lot of acronyms, buzzwords, and catchphrases in the cybersecurity industry today and it can be difficult to un…

Need to catch up on the past week’s cybersecurity news?
This week’s cyber resilience headlines included topics ranging from the automatic translation of email, to talk of the cyberrisk landscape of 2018, to Australia’s NDB scheme. Check out the late…

Need to catch up on the past week’s cybersecurity news?
This past week, news surrounding GDPR was everywhere. From what GDPR fines will really cost an organization to how your email archive will be affected, GDPR dominated the headlines. Predictions…

The Weakest Link in Your Cyber Resilience Strategy Might Be Your People
No matter how much you fortify your critical infrastructure against cyberattacks, there’s a perennial weak spot: the people who use it.
One kind of end-user closely follows emai…